"The book is quite readable, and some chapters are of professional interest to security practitioners. But chapters 1 through 8 should be read by those who use the Internet and who are interested in protecting their privacy, their assets, and even their very lives." G. Ernest Govea, in Security Management
"for the more advanced criminologist or criminologist in training, this book could be very useful. Overall, the book has a good selection of authors in SNA, and discussion of a nice assortment of current cybercrimes, including identity theft and cyberbullying. The authors also do a sufficient job of distinguishing between SNA and social networking (e.g., Facebook, Twitter). Summing Up: Recommended. Graduate students, faculty, professionals. L. L. Hansen, Western New England University "The book is quite readable, and some chapters are of professional interest to security practitioners. But chapters 1 through 8 should be read by those who use the Internet and who are interested in protecting their privacy, their assets, and even their very lives." G. Ernest Govea, in Security Management
"for the more advanced criminologist or criminologist in training, this book could be very useful. Overall, the book has a good selection of authors in SNA, and discussion of a nice assortment of current cybercrimes, including identity theft and cyberbullying. The authors also do a sufficient job of distinguishing between SNA and social networking (e.g., Facebook, Twitter). Summing Up: Recommended. Graduate students, faculty, professionals. L. L. Hansen, Western New England University